Securing a mobile adhoc network from routing attacks through the application of genetic algorithm
Securing AODV for MANETs using Message Digest with Secret Key
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization
Securing Internet Protocol (IP) Storage: A Case Study
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
Security Implications of Converged Networks and Protecting Them, without Compromising Efficiency
Security in Carrier Class Server Applications for All-IP Networks
Security in Wireless Sensor Networks: Issues and Challenges
Security Issues in the Optimized Link State Routing Protocol Version 2 (OLSRV2)
Security Visualization for peer-to-peer resource sharing applications
Security-Performance Tradeoffs of Inheritance based Key Predistribution for Wireless Sensor Networks
Selective data collection in vehicular networks for traffic control applications
Selective Multipath Interference Canceller with Linear Equalization for DS-UWB Systems with Low Spreading Factor
Self-* overload control for distributed web systems
Self-adaptive congestion control for multi-class intermittent connections in a communication network
Self-adaptive web intrusion detection system
Self-Adjusting Networks to Minimize Expected Path Length
Self-optimized Coverage Coordination in Femtocell Networks
Self-organization of Nodes using Bio-Inspired Techniques for Achieving Small World Properties
Self-Organization of Wireless Ad Hoc Networks as Small Worlds Using Long Range Directional Beams